Analysis

  • max time kernel
    149s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    22-10-2024 00:14

General

  • Target

    4ac846154d1f91c30a373dc364d880d7f36b0d1f23edbf8e854b38b804db7549.dll

  • Size

    700KB

  • MD5

    bfbcb9e4b4723629dda33d1406a87d3a

  • SHA1

    d342007297faf30e3cd1a703b31287e735470858

  • SHA256

    4ac846154d1f91c30a373dc364d880d7f36b0d1f23edbf8e854b38b804db7549

  • SHA512

    d0679c2dead14ccc998bf6ae31c79e3e4570a345401374a099e2feb3252eb1a2a2159b559a0963523f39e4080d6ecf672d2c397c12cdce7d1a142c7eb81afd41

  • SSDEEP

    12288:dEwgKnIhABTW0HcD5a1PKxdZhC+k+V9Hgeb/tf/B9P632vHAA:dEwXnOAx5HcDM1Sxd3ChCHg2/P9yGo

Malware Config

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Dridex Shellcode 1 IoCs

    Detects Dridex Payload shellcode injected in Explorer process.

  • Dridex payload 9 IoCs

    Detects Dridex x64 core DLL in memory.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 7 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Event Triggered Execution: Accessibility Features 1 TTPs

    Windows contains accessibility features that may be used by adversaries to establish persistence and/or elevate privileges.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\4ac846154d1f91c30a373dc364d880d7f36b0d1f23edbf8e854b38b804db7549.dll,#1
    1⤵
    • Checks whether UAC is enabled
    • Suspicious behavior: EnumeratesProcesses
    PID:2128
  • C:\Windows\system32\rekeywiz.exe
    C:\Windows\system32\rekeywiz.exe
    1⤵
      PID:2868
    • C:\Users\Admin\AppData\Local\HE6\rekeywiz.exe
      C:\Users\Admin\AppData\Local\HE6\rekeywiz.exe
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks whether UAC is enabled
      PID:2872
    • C:\Windows\system32\spreview.exe
      C:\Windows\system32\spreview.exe
      1⤵
        PID:2532
      • C:\Users\Admin\AppData\Local\wZVGb\spreview.exe
        C:\Users\Admin\AppData\Local\wZVGb\spreview.exe
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks whether UAC is enabled
        PID:2164
      • C:\Windows\system32\DisplaySwitch.exe
        C:\Windows\system32\DisplaySwitch.exe
        1⤵
          PID:1816
        • C:\Users\Admin\AppData\Local\83Tx\DisplaySwitch.exe
          C:\Users\Admin\AppData\Local\83Tx\DisplaySwitch.exe
          1⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks whether UAC is enabled
          PID:1988

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\83Tx\slc.dll

          Filesize

          704KB

          MD5

          48539273dc345606c1fa69ee468e0d3f

          SHA1

          20f36a167f6be2d6d1bb0d99ef57f2d1f119ef19

          SHA256

          e2a8e23f63c1e3ff859353a7ed6f77c45efe100d57f21158235d50d4afbbe31c

          SHA512

          03eb194aa9076708c7907572c0cab77e174838dd7e6d531d6b0925dbd7f95e034b0871fafa8b81f8225b3059c9a4eac1264abbac4f2f390aa80512566d24e687

        • C:\Users\Admin\AppData\Local\HE6\slc.dll

          Filesize

          704KB

          MD5

          5a7b5be4a67239eb1e5432561d22fb18

          SHA1

          27f75fc3a58f3901f0a3c5b5a3abf810d93b6d64

          SHA256

          e768cb174fe878a5de69c93cae742b9ba5a3fee6a2ef49df89111504812b70d1

          SHA512

          0850d0e58dae25a93a7609a4476eb81d5d2b34e58d058df844d89c4740b6f9f660f0b70252eacb50c950d6abad5d85aac822d59d66fdcbb9a0a9aae3ef61b8ec

        • C:\Users\Admin\AppData\Local\wZVGb\WINBRAND.dll

          Filesize

          704KB

          MD5

          c2a45924fe44863992d7a3a62a4f5943

          SHA1

          640d7404a8d3ba60f895d438f2e6a0b26b30addb

          SHA256

          e22a6e370adc5eb209e5f361a5da29d4e8eaccf87dc7550586284bf84f113e09

          SHA512

          bb74c78f4b22b14f18afea51a4937ffaed102bb5fbdb867aebb326bca46d0d58616bc3ae03a7b75e85c579b053dd72ea8315f05b59a0eab72eb77f4e948adda2

        • C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Wbvsyha.lnk

          Filesize

          1KB

          MD5

          d47efb26d0d86b4fdfd72ff4f7b145bb

          SHA1

          24515a8bd089876aa80f34d4ade6ae4fd3fee0b2

          SHA256

          6642a0b41dcac0550d6aedd14aa6a972af19c4bfecc52c809635da9dc9967f82

          SHA512

          c65513e723936b8424bb568d646fe72f24f084192dc4e2e4d07c28a13f0ed8334679a1bff8940b0fcc3174252b265f5c26db8464f409f21e19adffb34241c5e8

        • \Users\Admin\AppData\Local\83Tx\DisplaySwitch.exe

          Filesize

          517KB

          MD5

          b795e6138e29a37508285fc31e92bd78

          SHA1

          d0fe0c38c7c61adbb77e58d48b96cd4bf98ecd4a

          SHA256

          01a9733871baa8518092bade3fce62dcca14cdf6fc55b98218253580b38d7659

          SHA512

          8312174a77bab5fef7c4e9efff66c43d3515b02f5766ed1d3b9bd0abb3d7344a9a22cbac228132098428c122293d2b1898b3a2d75f5e4247b1dcb9aa9c7913b1

        • \Users\Admin\AppData\Local\HE6\rekeywiz.exe

          Filesize

          67KB

          MD5

          767c75767b00ccfd41a547bb7b2adfff

          SHA1

          91890853a5476def402910e6507417d400c0d3cb

          SHA256

          bd70e504871a2ac1c883d19b87970c8d1b8b251c784bf777ba77ed764f5f2395

          SHA512

          f096043452a1aa213a5e4d62638de3ee4b0b3ad3d12b7ee0372d8c79e00e2e13b4fd0ebc4206bbdb5124bed292dd5b30ef1641288046ef835f89c332985154f9

        • \Users\Admin\AppData\Local\wZVGb\spreview.exe

          Filesize

          294KB

          MD5

          704cd4cac010e8e6d8de9b778ed17773

          SHA1

          81856abf70640f102b8b3defe2cf65669fe8e165

          SHA256

          4307f21d3ec3b51cba6a905a80045314ffccb4c60c11d99a3d77cc8103014208

          SHA512

          b380264276bad01d619a5f1f112791d6bf73dc52cdd5cca0cc1f726a6f66eefc5a78a37646792987c508f9cb5049f0eb86c71fb4c7a2d3e670c0c8623f0522ee

        • memory/1200-26-0x0000000077AD0000-0x0000000077AD2000-memory.dmp

          Filesize

          8KB

        • memory/1200-23-0x0000000002E80000-0x0000000002E87000-memory.dmp

          Filesize

          28KB

        • memory/1200-14-0x0000000140000000-0x00000001400AF000-memory.dmp

          Filesize

          700KB

        • memory/1200-13-0x0000000140000000-0x00000001400AF000-memory.dmp

          Filesize

          700KB

        • memory/1200-12-0x0000000140000000-0x00000001400AF000-memory.dmp

          Filesize

          700KB

        • memory/1200-11-0x0000000140000000-0x00000001400AF000-memory.dmp

          Filesize

          700KB

        • memory/1200-8-0x0000000140000000-0x00000001400AF000-memory.dmp

          Filesize

          700KB

        • memory/1200-7-0x0000000140000000-0x00000001400AF000-memory.dmp

          Filesize

          700KB

        • memory/1200-24-0x0000000140000000-0x00000001400AF000-memory.dmp

          Filesize

          700KB

        • memory/1200-6-0x0000000140000000-0x00000001400AF000-memory.dmp

          Filesize

          700KB

        • memory/1200-25-0x0000000077AA0000-0x0000000077AA2000-memory.dmp

          Filesize

          8KB

        • memory/1200-37-0x0000000140000000-0x00000001400AF000-memory.dmp

          Filesize

          700KB

        • memory/1200-36-0x0000000140000000-0x00000001400AF000-memory.dmp

          Filesize

          700KB

        • memory/1200-10-0x0000000140000000-0x00000001400AF000-memory.dmp

          Filesize

          700KB

        • memory/1200-45-0x0000000077836000-0x0000000077837000-memory.dmp

          Filesize

          4KB

        • memory/1200-15-0x0000000140000000-0x00000001400AF000-memory.dmp

          Filesize

          700KB

        • memory/1200-9-0x0000000140000000-0x00000001400AF000-memory.dmp

          Filesize

          700KB

        • memory/1200-3-0x0000000077836000-0x0000000077837000-memory.dmp

          Filesize

          4KB

        • memory/1200-4-0x0000000002EA0000-0x0000000002EA1000-memory.dmp

          Filesize

          4KB

        • memory/1988-90-0x0000000140000000-0x00000001400B0000-memory.dmp

          Filesize

          704KB

        • memory/2128-44-0x0000000140000000-0x00000001400AF000-memory.dmp

          Filesize

          700KB

        • memory/2128-2-0x0000000000110000-0x0000000000117000-memory.dmp

          Filesize

          28KB

        • memory/2128-0-0x0000000140000000-0x00000001400AF000-memory.dmp

          Filesize

          700KB

        • memory/2164-74-0x0000000140000000-0x00000001400B0000-memory.dmp

          Filesize

          704KB

        • memory/2872-58-0x0000000140000000-0x00000001400B0000-memory.dmp

          Filesize

          704KB

        • memory/2872-54-0x0000000140000000-0x00000001400B0000-memory.dmp

          Filesize

          704KB

        • memory/2872-53-0x00000000001F0000-0x00000000001F7000-memory.dmp

          Filesize

          28KB